80 likes | 95 Views
Dive into current topics in trusted computing with Dr. Clifford Neuman from USC - from firewalls to reputation-based systems, performance considerations, mobile device security, and the role of trusted platforms in forensics.
E N D
USC CSci599Trusted Computing - Lecture FourteenCurrent Topics20 April 2007 Dr. Clifford Neuman University of Southern California Information Sciences Institute
Announcements • Additional lecture audio posted • (thanks Rob Huber) • Next week is final lecture • Projects due • Class Evaluation Next Week
Presentations • Diana Kirtley • Vijay Gopala Krishnan (possibly)
TC and Distributed Firewalls • Product space for firewalls • Traditional firewalls • Host based firewalls • Embedded firewalls • Distributed firewalls • Benefits of each • Limitations of each • How can trusted computing help • What about TVSA
TC and Reputation Based Systems • How TC can help • Limit number of identities • Manage reputation directly • Protect credentials use by participants • What about reputation used for TC • How we determine which programs are trusted.
TC and Performance • Costs of trusted computing lie in: • Measurement during load • Crypto for attestation “Quote” • Managing “what” is allowed • Overhead of virtualization • Human costs of separation
TC and Mobile Devices • Using mobile devices as “trusted path” to user • Attestation enables trusted device to verify integrity of the device that is requesting path to user. • Some of these ideas are being explored by Adrian Perrig at CMU • (work some examples)
TC and Forensics • Chain of custody is important for forensics • A TPM that signs and dates something in such a way that it can not be later modified – even by the person possessing it, can replace traditional chain of custody. • Must argue that the TPM can not be compromised. • A way of linking series of attestations can help.